CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence Apr 11, 2026

iOT365, Check Point Software partner to offer threat intelligence for OT, IoT devices and networks - Industrial Cyber

Industrial Cyber Archived Apr 11, 2026 ✓ Full text saved

iOT365, Check Point Software partner to offer threat intelligence for OT, IoT devices and networks Industrial Cyber

Full text archived locally
✦ AI Summary · Claude Sonnet


    News Vendors iOT365, Check Point Software partner to offer threat intelligence for OT, IoT devices and networks June 11, 2025 iOT365, a vendor of OT (operational technology) and IoT cybersecurity, announced a partnership with Check Point Software Technologies Ltd., a vendor of cybersecurity solutions, providing deep visibility, zero-trust enforcement, and proactive defense for industrial sites and critical infrastructure, without disrupting operations. The iOT365 Cybersecurity Platform uses AI-powered analytics and multi-layer false positive filtering to identify real threats to OT and IoT devices and networks in real time, with high precision. Together with Check Point IoT Protect and Check Point’s vast global threat database, the joint solution enables tailored responses – from passive monitoring to full active prevention – based on customer policy. “This partnership gives iOT365 comprehensive protection across the OT/IoT security spectrum, minimizing noise and maximizing actionable alerts while also enhancing our ability to prevent cyberattacks,” said Alex Tartakovsky, CEO of iOT365. “This collaboration benefits industrial and critical infrastructure organizations worldwide who want deep visibility, zero-trust enforcement, proactive defense, and the ability to prevent cyber threats targeting their OT and IoT networks.” The iOT365 lightweight, agentless platform deploys into OT and IoT networks, connecting to switches using either physical or virtual data collectors. Within minutes, the platform provides end-to-end visibility into all industrial assets, protocols, and traffic patterns and analyzes all traffic to identify and classify threats using the MITRE ATT&CK framework. When installed alongside Check Point Quantum Security Gateways, the iOT365 platform sends information about all the devices connecting to the OT and IoT networks it’s monitoring, including vendor name, firmware version, and MAC and IP addresses, to Check Point IoT Protect, where those devices are checked against Check Point’s threat intelligence database. When working in an air-gapped environment, device information is still transmittable using unidirectional data diodes. Check Point IoT Protect users are then alerted to any threatening devices detected by the iOT365 Platform and have the option to block the devices at the security gateway, or to allow them to connect through to the monitored networks.  “OT and IoT environments face unique and escalating security challenges, with traditional tools often falling short,” said Avi Grabinsky, product manager for Quantum IoT Protect at Check Point Software Technologies. “Our collaboration with iOT365 extends our proactive defense capabilities to these environments, delivering the precision, visibility, and enforcement that critical infrastructure needs to stay protected—without disrupting operations.” Industrial Cyber News Desk Industrial Cyber News Desk Related Claroty says CEA-852 adoption accelerates risk as building systems become exposed to critical infrastructure threats Internet-exposed ICS devices running insecure Modbus leave critical infrastructure open to disruption, Comparitech finds Censys warns systemic exposure of Rockwell PLCs enable Iran-linked targeting of critical infrastructure OT networks CCN reports cybersecurity maturity becoming prerequisite in critical infrastructure, industrial supply chains UK NCSC says APT28 exploits routers for DNS hijacking, enabling large-scale traffic interception DOE allocates $160 million to secure energy systems as cyber threats converge with grid modernization Ongoing cyberattacks targeting internet-connected PLCs disrupt US critical infrastructure, agencies warn FBI reports cyber threats to critical infrastructure intensify as US cybercrime losses hit $21 billion, exposes risk Tosi reports US enterprises improve OT security maturity, but vendor access emerges as critical weakness Bitsight names John Clancy as CEO to steer growth in AI-driven cybersecurity era
    💬 Team Notes
    Article Info
    Source
    Industrial Cyber
    Category
    ◉ Threat Intelligence
    Published
    Apr 11, 2026
    Archived
    Apr 11, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗